Two security approaches, working in tandem, provide superior enterprise protection.
As mobile devices become more ubiquitous, they and not the Windows desktop will become Ground Zero for attacks and exploits.
Follow these steps to achieve comprehensive visibility. They aren’t easy but they are necessary.
The availability and sophistication of crimeware kits has contributed to the rapid evolution -- as well as the increasing sophistication -- of cybercrime itself.
How do you secure an environment in which risky behavior is business as usual?
We outline seven steps that help you address the people aspect of data security.
Completely blocking access to social networking sites or online communities is not necessarily the only -- or the best way -- to stop these threats before they affect your business. The answer may lie in educating your workforce.
Talk about post-Christmas letdowns: spam volumes tanked after December 25th. What happened -- and can it last?
Best practices for protecting your mobile and enterprise assets.
How to improve security for mobile users in light of new, complex technologies such as cloud computing.
According to a new study, more than half of U.S. businesses aren’t erasing data from computers or storage assets prior to retiring them.
Whitelisting applications can be a more effective and lower-impact technique for protecting your enterprise than are traditional antivirus approaches.
Security admins faced a host of vulnerabilities and new attacks in 2010, but the nightmare scenarios that could've kept security pros up at night blessedly didn't come to pass.
What’s driving the interest in identity and access management, and how can you address the challenges the technology presents?
Learn how a "defense-in-depth" strategy can provide greater protection to your enterprise.
Mid-size shops are increasingly -- even disproportionately -- coming under attack by hackers, yet few security budgets are rising.
Unix/Linux systems needn't be islands of identity; we show you the challenges and options for addressing authentication, provisioning, and security and take a closer look at Active Directory bridges.
A controversial new report shows vendors are leaving enterprises seriously exposed.
Today's security market differs greatly from the market that was hammered almost a decade ago, following the dot.com implosion.
Four questions that promote security and regulatory compliance in your enterprise